Sciweavers

1833 search results - page 268 / 367
» Mechanized Verification with Sharing
Sort
View
ICC
2009
IEEE
144views Communications» more  ICC 2009»
15 years 11 months ago
Power Allocation for Multi-Access Two-Way Relaying
—We consider a multi-access two-way relay network where multiple pairs of users exchange information with their pre-assigned partners with the assistance of an intermediate relay...
Min Chen, Aylin Yener
IEEEPACT
2009
IEEE
15 years 11 months ago
Characterizing the TLB Behavior of Emerging Parallel Workloads on Chip Multiprocessors
Translation Lookaside Buffers (TLBs) are a staple in modern computer systems and have a significant impact on overall system performance. Numerous prior studies have addressed TL...
Abhishek Bhattacharjee, Margaret Martonosi
INFOCOM
2009
IEEE
15 years 11 months ago
Diverse Routing in Networks with Probabilistic Failures
—We develop diverse routing schemes for dealing with multiple, possibly correlated, failures. While disjoint path protection can effectively deal with isolated single link failur...
Hyang-Won Lee, Eytan Modiano
DRM
2009
Springer
15 years 11 months ago
An implementation experience of domain management in marlin
Digital Rights Management (DRM) is used to protect copyrighted content from unauthorized use. However, this has taken away the jurisdiction of the consumers over their purchased c...
Sye Loong Keoh, Koen Vrielink
ISAAC
2009
Springer
114views Algorithms» more  ISAAC 2009»
15 years 11 months ago
Good Programming in Transactional Memory
Abstract. In a multicore transactional memory (TM) system, concurrent execution threads interact and interfere with each other through shared memory. The less interference a progra...
Raphael Eidenbenz, Roger Wattenhofer